【UMTS安全】

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

UMTSSecurityValtteriNiemiandKaisaNybergNokiaResearchCenter,FinlandUniversalMobileTelecommunicationsSystemSecurityUMTSSecurityValtteriNiemiandKaisaNybergNokiaResearchCenter,FinlandCopyright#2003JohnWiley&SonsLtd,TheAtrium,SouthernGate,Chichester,WestSussexPO198SQ,EnglandTelephone(þ44)1243779777Email(forordersandcustomerserviceenquiries):cs-books@wiley.co.ukVisitourHomePageon@wiley.co.uk,orfaxedto(þ44)1243770620Thispublicationisdesignedtoprovideaccurateandauthoritativeinformationinregardtothesubjectmattercovered.ItissoldontheunderstandingthatthePublisherisnotengagedinrenderingprofessionalservices.Ifprofessionaladviceorotherexpertassistanceisrequired,theservicesofacompetentprofessionalshouldbesought.OtherWileyEditorialOfficesJohnWiley&Sons,Inc.,111RiverStreet,Hoboken,NJ07030,USAJossey-Bass,989MarketStreet,SanFrancisco,CA94103-1741,USAWiley-VCHVerlagGmbH,Boschstr.12,D-69469Weinheim,GermanyJohnWiley&SonsAustraliaLtd,33ParkRoad,Milton,Queensland4064,AustraliaJohnWiley&Sons(Asia)PteLtd,2ClementiLoop#02-01,JinXingDistripark,Singapore129809JohnWiley&SonsCanadaLtd,22WorcesterRoad,Etobicoke,Ontario,CanadaM9W1L1Wileyalsopublishesitsbooksinavarietyofelectronicformats.Somecontentthatappearsinprintmaynotbeavailableinelectronicbooks.LibraryofCongressCataloging-in-PublicationDataNiemi,Valterri.UMTSsecurity/byValterriNiemiandKaisaNyberg.p.cm.ISBN0-470-84794-81.Computersecurity.2.Computernetworks—Securitymeasures.3.Mobilecommunicationsystems—Securitymeasures.4.Wirelesscommunicationsystems—Securitymeasures.5.Globalsystemformobilecommunications—Securitymeasures.I.Nyberg,Kaisa,1948–II.Title.QA76.9.A25N542003005.8—dc222003022090BritishLibraryCataloguinginPublicationDataAcataloguerecordforthisbookisavailablefromtheBritishLibraryISBN0-470-85314-XProjectmanagementbyOriginator,GtYarmouth,Norfolk(typesetin10/13ptTimes)PrintedandboundinGreatBritainbyAntonyRowe,Chippenham,WiltshireThisbookisprintedonacid-freepaperresponsiblymanufacturedfromsustainableforestryinwhichatleasttwotreesareplantedforeachoneusedforpaperproduction.ContentsPrefacexiPARTI:SECURITYARCHITECTUREFORUMTS11IntroductiontoSecurityandtoUMTS31.1SecurityinTelecommunications31.1.1Generalsecurityprinciples41.1.2GSMsecurity71.2TheBackgroundto3G111.3The3GPartnershipProject(3GPP)121.43GPPNetworkArchitecture141.4.1Elementsinthearchitecture151.4.2Protocolsinthe3GPPsystem181.5WCDMARadioTechnology201.5.1CDMA:anexample221.5.2BasicfactsofWCDMA231.5.3Handovers251.5.4Powercontrol252UMTSSecurityFeaturesinRelease1999292.1AccessSecuritytoUMTS292.1.1Mutualauthentication302.1.2Temporaryidentities422.1.3UTRANencryption442.1.4IntegrityprotectionofRRCsignalling542.1.5Set-upofUTRANsecuritymechanisms592.1.6SummaryofaccesssecurityintheCSandPSdomains632.2InterworkingwithGSM632.2.1Interworkingscenarios652.2.2CaseswithSIM662.2.3CaseswithUSIM672.2.4Handoversfromonesystemtoanother682.3AdditionalSecurityFeaturesinRelease1999692.3.1Cipheringindicator692.3.2IdentificationoftheUE692.3.3SecurityforLocationServices(LCs)702.3.4User-to-USIMauthentication702.3.5SecurityintheUSIMapplicationtoolkit702.3.6MobileExecutionEnvironment(MExE)702.3.7Lawfulinterception713SecurityFeaturesinReleases4and5733.1NetworkDomainSecurity733.1.1MAPsec743.1.2IPsec813.1.3IPsec-basedmechanismsinUMTS843.1.4Roleoffirewalls863.2IMSSecurity873.2.1BasicsofSIP873.2.2IMSarchitecture903.2.3ArchitectureforsecuringaccesstotheIMS913.2.4PrinciplesforIMSaccesssecurity933.2.5UseofHTTPDigestAKA953.2.6Securitymodeset-up1003.2.7IntegrityprotectionwithESP1013.2.8Errorcasehandling1043.3OtherSecuritySystems1063.3.1Higherlayersecuritysystems1063.3.2Linklayersecuritysystems108PARTII:CRYPTOGRAPHICALGORITHMS1114IntroductiontoCryptography1134.1TheScienceofCryptology1134.1.1Cryptographicsystems1134.1.2Securityandvulnerability1154.1.3Developingcryptologyintoapubliclyavailablescience1164.1.4Publiccryptographicdevelopmentefforts1184.2RequirementsandAnalysisofCryptographicAlgorithms1194.2.1Blockciphers120viContents4.2.2Streamciphers1254.2.3Messageauthenticationcodes12753GPPAlgorithmSpecificationPrinciples1316ConfidentialityandIntegrityAlgorithms1356.1RequirementsfortheConfidentialityAlgorithm1356.1.1Functionalrequirements1356.1.2Algorithmoperation1366.1.3Interfacestothealgorithm1376.2RequirementsfortheIntegrityAlgorithm1396.2.1Overview1396.2.2Interface1406.3DesignTaskForce1426.4GettingStarted1426.4.1SAGEcontributiontoSA31436.4.2ModesaroundMISTY11436.4.3Particularsecuritycriteria1446.5DesignProcess1446.5

1 / 288
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功